Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Education & TrainingCybersecurity News

Only 9% of Millennials Want a Cybersecurity Career

cyber responsive default
May 11, 2018

Millennials and post-millennials play a key role in solving the cybersecurity skills shortage now and in the future, according to a new survey.

New data by Protectwise shows that younger generations understand and acknowledge that technology and computing are likely to play a significant role in their future careers.

  • 68 percent of respondents would classify themselves as either a technology innovator (27 percent) or early adopters of technology (41 percent)
  • Gaming has contributed to an appetite for technology-oriented careers. Forty percent of all surveyed have been gamers for more than 10 years

According to the study, "This group not only loves their devices, but technology also influences their schooling choices, guides their anticipated studies at university and affects the types of careers they are considering."

  • 48 percent had been part of a STEM program during their K-12 education
  • As a group, 82 percent of high school-age respondents planned to enroll in college after the completion of high school
  • Computer Science and Technology (e.g., computer engineering) was the college major most cited by the survey populace as their intended (or actual) field of study – 23 percent. This is followed by:
    • ​Science and Mathematics (e.g., biology, chemistry, environmental studies, statistics, pure mathematics, physics) – 18 percent planned to focus on this major
    • Engineering (e.g., biotechnology, computer engineering, aerospace engineering) – 15 percent
  • ​A vast majority of respondents suggested that they are interested in computer-related careers, including: Video game development (33 percent); computer sciences/software development (21 percent); engineering (15 percent); scientific research (13 percent); information technology (11 percent) and cybersecurity (9 percent)< >If we add in graphic design by assuming the Computer Aided Design element, 14 of the 16 fields respondents were interested in someday working are generally considered technology careers Perspectives

    Interestingly, the results suggest that not only are millennials and post-millennials the key to solving the current and pending talent shortage, but young females show tendencies that make them well suited to become part of the solution.

However, said the study, millennials and post-millennials participating in the study clearly indicated some of the challenges the cybersecurity field must overcome if it wishes to funnel some of this technology and computing-savvy population into cybersecurity careers. The first steps of this process would seem to be simply making millennials aware of the field as a profession.

  • Most in the younger generations don’t know any cybersecurity professionals: Only 17 percent said that someone in their family has ever worked in the cybersecurity field
    • ​Of those surveyed, just four males described their current job as being in the field of cybersecurity
  • They haven’t had the opportunity to learn about cybersecurity: A vast majority of respondents (69 percent) had never taken a class in school that focused on cybersecurity
    • This is primarily because they never had a choice: 65 percent said that their school(s) never offered courses

A necessary second step would be to increase the cybersecurity learning opportunities available to millennials and post-millennials. This lack of awareness and opportunity shortage is directly feeding the pending and future skills shortage. As a result, only nine percent of respondents initially indicated that cybersecurity is a career they are interested in pursuing at some point in their lives. Again, the lack of previous opportunity would seem to be heavily influencing perceptions. When respondents were asked why cybersecurity was not a career they were considering, ignorance of and lack of opportunity to learn bubble to the top of their responses:

  • “Don't know enough about this field/career path” was the reason most often selected by those that were not interested – 37 percent
  • Don't believe I have the technical ability/knowledge/aptitude – 28 percent
  • Level of education required – 21 percent
  • Number of certifications required – 15 percent

The latter three concerns expressed by millennials and post-millennials would seemingly be addressed by providing earlier exposure to information security learning opportunities, with the first concern also benefiting from this approach. The vast majority are not rejecting future careers in cybersecurity outright — in fact, less than a third flat-out proclaimed they were not interested in cybersecurity as a career.

According to the study, there are "Indications that female millennials may present the industry’s best chance to effectively overcome the security skills shortage. The first obstacle is a familiar one: the biased perception of female aptitude or “appropriateness” for certain career choices."

Survey responses show that:

  • Two times as many males than females are planning to study engineering at college
  • Twice as many men plan to study computer science
  • Males are twice as likely to plan to study Science and Mathematics than female survey respondents
  • Twice the amount of men interviewed as part of our survey are considering IT as a field than women survey respondents
  • Females surveyed have proven they are not technology averse, reporting they game online as frequently as male counterparts, as an example
  • In fact, more males than females consider themselves late adopters of technology. Male and female early adopters are statistically similar
  • Female respondents actually showed quicker and higher rates of adoption of some of the latest technologies (virtual reality is an example, with females more likely than males to have tried VR more than 7 months ago) –  52 percent (F) vs. 42 percent (M)
    • ​More women than men indicate that they have advanced technology (like VR) in their household
    • Women have also indicated that they have spent more time using and would be willing to spend more time using these technologies

According to the study, "This tech adoption and familiarity would also seem to indicate a growing interest in tech-related courses for study and career options."

  • 10 percent more women respondents than men plan to enroll in College straight out of high school
  • Women are only slightly less likely to consider information technology professions as a most desirable career compared to men

"Based on responses provided by the people surveyed, the cybersecurity industry must take a proactive stance in creating awareness and providing early learning opportunities," said the report. "Companies can choose to support after-school cybersecurity clubs or help to develop and implement actual cybersecurity curriculum for high school – there are multitude of ways to help develop tomorrow’s security pro."

https://www.protectwise.com/post/survey-suggests-younger-generations-including-females-may-fill-the-cybersecurity-talent-gap/

KEYWORDS: cybersecurity degrees cybersecurity skills cybersecurity training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0918-News4-feature-slide_900px

    80 Percent of U.S. Adults Have Never Considered a Career in Cybersecurity

    See More
  • Security Education

    80 Percent of U.S. Adults Have Never Considered a Cybersecurity Career

    See More
  • students on laptops

    9 US universities awarded cybersecurity career development grants

    See More

Related Products

See More Products
  • Career Network (60 days)

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!